Analysis
-
max time kernel
119s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/09/2024, 00:11
Static task
static1
Behavioral task
behavioral1
Sample
eef06d4d535f3f82fd75839ee782af64f9b2f5bb04cf4999df9b642d979be9fbN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eef06d4d535f3f82fd75839ee782af64f9b2f5bb04cf4999df9b642d979be9fbN.exe
Resource
win10v2004-20240802-en
General
-
Target
eef06d4d535f3f82fd75839ee782af64f9b2f5bb04cf4999df9b642d979be9fbN.exe
-
Size
96KB
-
MD5
d86057092bc44f69442ef306916992a0
-
SHA1
fbac0befdc8a074b96a00991b7c9e4b2f2ef1b21
-
SHA256
eef06d4d535f3f82fd75839ee782af64f9b2f5bb04cf4999df9b642d979be9fb
-
SHA512
55151b7ec1c26a35e622c449653853c17b5fe56d94f094878d3322d3d393caf1b9bb60ebddc2088728d654da2fa10eaecb34c7092bcce1d9f1149be1a4f9db5f
-
SSDEEP
1536:/TBBGNgzWwmhLmncdkadGVScGYJXeiyCnO+TI4K4I4i404R4Z1VcvsJOpPpMm4/O:NBGuW6cOadGRJuH7ut/Tdvd+hXV/vU3r
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" roxom.exe -
Executes dropped EXE 1 IoCs
pid Process 2340 roxom.exe -
Loads dropped DLL 2 IoCs
pid Process 2348 eef06d4d535f3f82fd75839ee782af64f9b2f5bb04cf4999df9b642d979be9fbN.exe 2348 eef06d4d535f3f82fd75839ee782af64f9b2f5bb04cf4999df9b642d979be9fbN.exe -
Adds Run key to start application 2 TTPs 48 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /G" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /R" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /k" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /B" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /K" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /v" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /d" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /c" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /s" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /x" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /z" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /u" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /r" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /l" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /t" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /O" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /m" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /L" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /D" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /w" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /F" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /j" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /M" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /Y" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /n" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /o" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /f" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /S" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /g" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /X" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /T" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /Q" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /p" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /y" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /J" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /h" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /E" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /V" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /H" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /q" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /e" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /N" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /I" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /U" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /a" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /C" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /W" roxom.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\roxom = "C:\\Users\\Admin\\roxom.exe /A" roxom.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eef06d4d535f3f82fd75839ee782af64f9b2f5bb04cf4999df9b642d979be9fbN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language roxom.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe 2340 roxom.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2348 eef06d4d535f3f82fd75839ee782af64f9b2f5bb04cf4999df9b642d979be9fbN.exe 2340 roxom.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2340 2348 eef06d4d535f3f82fd75839ee782af64f9b2f5bb04cf4999df9b642d979be9fbN.exe 30 PID 2348 wrote to memory of 2340 2348 eef06d4d535f3f82fd75839ee782af64f9b2f5bb04cf4999df9b642d979be9fbN.exe 30 PID 2348 wrote to memory of 2340 2348 eef06d4d535f3f82fd75839ee782af64f9b2f5bb04cf4999df9b642d979be9fbN.exe 30 PID 2348 wrote to memory of 2340 2348 eef06d4d535f3f82fd75839ee782af64f9b2f5bb04cf4999df9b642d979be9fbN.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\eef06d4d535f3f82fd75839ee782af64f9b2f5bb04cf4999df9b642d979be9fbN.exe"C:\Users\Admin\AppData\Local\Temp\eef06d4d535f3f82fd75839ee782af64f9b2f5bb04cf4999df9b642d979be9fbN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\roxom.exe"C:\Users\Admin\roxom.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD529ddf5e3c92f893078872cfce4318477
SHA15eda899538b1c09282a03af3185a6b827bc6467c
SHA25654de08ee8cd6a937e7fd4de24dc6c015a5a1c26f59247a6e1e6736add1956019
SHA512cddb3394987f64c1674886db9c72bf462e440402963e29b3bf3aed32378e01e2ed0d857023e1f3dac31108bc325b270bedb8f41674409e5fc11e18ccecda2151